CEH v11: DoS, DDoS, Volumetric & Protocol Attacks
Ethical Hacker v11
| Intermediate
- 3 Videos | 50m 9s
- Includes Assessment
- Earns a Badge
Denial of Service attacks can be very disruptive to an organization both monetarily and reputationally. In this course, you'll explore Denial of Service and Distributed Denial of Service attacks, as well as common DoS techniques and categories and common tools used to perform them. Next, you'll examine volumetric DoS attacks, which are one of the more common types deployed by attackers. These include UDP flood, Ping of Death, Smurf, and Pulse Wave. Finally, you'll learn about protocol-based DoS attacks, including SYN floods, ACK floods, and fragmentation attacks. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.
WHAT YOU WILL LEARN
-
identify the tools used to perform a denial-of-service attackidentify the types of denial of service (DoS) attacksidentify a command to perform a ping of death attackrecognize the command to issue to perform a UDP flood attack
-
recognize the different volumetric attack typesidentify the command to perform a SYN flood attackidentify the different types of DoS attacksrecognize the different types of flood attacks
IN THIS COURSE
-
1.DoS and DDoS Attacks12m 16s
-
2.Volumetric Attacks20m 42s
-
3.Protocol Attacks17m 11s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.